In an alarming new development, a sophisticated Android banking trojan dubbed OctoV2 has emerged, posing as the popular DeepSeek AI application. This malware campaign employs cunning tactics to deceive users, ultimately stealing their login credentials and other sensitive information. With DeepSeek rapidly gaining popularity, cybercriminals are capitalizing on its trusted name to spread malicious software. The Rise of DeepSeek and Its Popularity DeepSeek, an advanced AI chatbot developed by a Chinese startup based in Hangzhou, quickly gained traction after its release in January 2025. With versions available on both iOS and Android, DeepSeek’s intuitive design and impressive capabilities have attracted…
Author: Cyber infos
In the ever -evolving world of online crime, few names have received as much attention as Black Basta. This ransomware-as-a-Service (Raas) group, which appeared in April 2022, has rapidly risen to its sophisticated tactics and high-value objectives. But what really sets Black Basta apart is the merciless focus on Edge Network devices, using a framework for Brute Force that has left cybersecurity experts both impressed and frightened. Leak That Changed Everything On February 11, 2025, a Russian-speaking actor using the Telegram handle @ExploitWhispers dropped a bombshell: internal chat logs of Black Basta RaaS members. These logs, spanning from September 2023…
In the ever-changing landscape of cybersecurity, threats are continuously evolving, adapting, and discovering new pathways to exploit weaknesses. Enter into Mora_001, a recently discovered threat actor that has rapidly gained a reputation for a methodical and sophisticated network compromise methodology. Their weapon of choice? A tailor-made ransomware variant labeled “SuperBlack.” The usual ransomware attack this is not, this is a complex, multi-pronged attack that highlights the increasing sophistication of cybercriminals. The exploitation: a perfect storm of vulnerabilities The campaign for Mora_001 starts with the exploitation of two important Fortinet CVEs: CVE-2024-55591 and CVE-2025-24472. These vulnerabilities, which have an impact on FortiOS versions below 7.0.16, could be…
Artificial intelligence revolutionizes productivity in offices, and Microsoft Copilot will be one such pioneer. Businesses all over the world immediately adopted the AI assistant into their operations shortly after its launch in 2023, using it to automate processes in Microsoft 365 applications. Technically, at the birth of every new technology, there is just as much of an equal opportunity for something new to endanger the security of all systems using it. Cybercriminals, always adept at hunting fresh chances, seem to have converged on Microsoft Copilot. Phishing campaigns now sham messages that closely resemble what could be sent from Microsoft’s Copilot…
Every day new vulnerabilities are discovered by the minute, and their severity varies, with some able to shake the foundation of even the most trusted security solution. Sleeping Beauty is one such vulnerability discovered in CrowdStrike’s Falcon Sensor by security researchers from SEC Consult. Malicious actors were able to spoil detection mechanisms and silently run malicious applications. This story is not just about technical machinations but a wake-up call about the need for vigilance, transparency, and collaboration in the cybersecurity community Detection Gap or Fatal Weakness? The Sleeping Beauty vulnerability was first reported to CrowdStrike in late 2023. Crowdsike at…
Today, nothing evolves as rapidly as the landscape of digital threats. The cyber threat environment is filled with ambuscades by malware authors who constantly refine their techniques to outsmart traditional security controls’ implementations through the use of obfuscation, encryption, and increasingly advanced evasion tactics. Against such threats, cyber defense teams depend on dynamic malware analysis tools that tool authorizes them to employ and visualize malicious software in controlled environments. Dynamic Malware Analysis, So why is it highlighted for the installation of extra software relative to the dangers? What part does dynamic malware analysis have to play while keeping cyber-criminals one…
